Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7 -
submitted
19-07-2020 19:50
Static task
static1
Behavioral task
behavioral1
Sample
zloader 2_1.0.9.0.vir.exe
Resource
win7
Behavioral task
behavioral2
Sample
zloader 2_1.0.9.0.vir.exe
Resource
win10
General
-
Target
zloader 2_1.0.9.0.vir.exe
-
Size
151KB
-
MD5
bb7433758b61eb6483579bdae17392cf
-
SHA1
4a007e1c530cdd23f9ea800f0530f4da6a5d7080
-
SHA256
8d1cba212e338195e1edb8d4e4dde560fd9a36c0d177d6f5419e4e4e5e5c5b3d
-
SHA512
e769b53220e4680f751fdb6041b8bdaf8119870cb1b427664284ec7530eb1107956f6299a8bd1e84ca3f3c959acdf60a359715d72bb21615f069ee6e7f0d6e67
Malware Config
Extracted
zloader
nder
fallout
https://ifjedssofllvcr.com/jbYm9bt/NlGkb4ivk.php
https://isfjiaaodwsoi.com/jbYm9bt/NlGkb4ivk.php
https://mslfiedjssfdes.com/jbYm9bt/NlGkb4ivk.php
https://sifeiwdjiesde.com/jbYm9bt/NlGkb4ivk.php
https://sldeodjiweiswi.com/jbYm9bt/NlGkb4ivk.php
Signatures
-
Blacklisted process makes network request 3 IoCs
Processes:
msiexec.exeflow pid process 19 1636 msiexec.exe 20 1636 msiexec.exe 22 1636 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fiehb = "C:\\Users\\Admin\\AppData\\Roaming\\Odbyci\\ubucb.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
zloader 2_1.0.9.0.vir.exedescription pid process target process PID 1100 set thread context of 1636 1100 zloader 2_1.0.9.0.vir.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1636 msiexec.exe Token: SeSecurityPrivilege 1636 msiexec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
zloader 2_1.0.9.0.vir.exedescription pid process target process PID 1100 wrote to memory of 1636 1100 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 1100 wrote to memory of 1636 1100 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 1100 wrote to memory of 1636 1100 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 1100 wrote to memory of 1636 1100 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 1100 wrote to memory of 1636 1100 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 1100 wrote to memory of 1636 1100 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 1100 wrote to memory of 1636 1100 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 1100 wrote to memory of 1636 1100 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 1100 wrote to memory of 1636 1100 zloader 2_1.0.9.0.vir.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\zloader 2_1.0.9.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader 2_1.0.9.0.vir.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blacklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1636-0-0x00000000000B0000-0x00000000000DB000-memory.dmpFilesize
172KB
-
memory/1636-1-0x00000000000E0000-0x00000000000E1000-memory.dmpFilesize
4KB
-
memory/1636-2-0x00000000000B0000-0x00000000000DB000-memory.dmpFilesize
172KB
-
memory/1636-3-0x0000000000000000-mapping.dmp